Sciweavers

6306 search results - page 1159 / 1262
» Space, Time, and the Use of Language
Sort
View
PODS
2008
ACM
165views Database» more  PODS 2008»
15 years 10 months ago
Data exchange and schema mappings in open and closed worlds
In the study of data exchange one usually assumes an openworld semantics, making it possible to extend instances of target schemas. An alternative closed-world semantics only move...
Leonid Libkin, Cristina Sirangelo
ICDAR
2007
IEEE
15 years 4 months ago
Energy-Based Models in Document Recognition and Computer Vision
The Machine Learning and Pattern Recognition communities are facing two challenges: solving the normalization problem, and solving the deep learning problem. The normalization pro...
Yann LeCun, Sumit Chopra, Marc'Aurelio Ranzato, Fu...
KBSE
2005
IEEE
15 years 3 months ago
Secure sharing between untrusted users in a transparent source/binary deployment model
The Nix software deployment system is based on the paradigm of transparent source/binary deployment: distributors deploy descriptors that build components from source, while clien...
Eelco Dolstra
GECCO
2004
Springer
145views Optimization» more  GECCO 2004»
15 years 3 months ago
Search Based Automatic Test-Data Generation at an Architectural Level
Abstract. The need for effective testing techniques for architectural level descriptions is widely recognised. However, due to the variety of domain-specific architectural descript...
Yuan Zhan, John A. Clark
ICALP
2003
Springer
15 years 3 months ago
Anycasting in Adversarial Systems: Routing and Admission Control
Abstract. In this paper we consider the problem of routing packets in dynamically changing networks, using the anycast mode. In anycasting, a packet may have a set of destinations ...
Baruch Awerbuch, André Brinkmann, Christian...
« Prev « First page 1159 / 1262 Last » Next »